CN103339978B - For providing the technology of criminal's imaging of improvement - Google Patents

For providing the technology of criminal's imaging of improvement Download PDF

Info

Publication number
CN103339978B
CN103339978B CN201180066022.2A CN201180066022A CN103339978B CN 103339978 B CN103339978 B CN 103339978B CN 201180066022 A CN201180066022 A CN 201180066022A CN 103339978 B CN103339978 B CN 103339978B
Authority
CN
China
Prior art keywords
terminal device
client terminal
difference
pixel data
multiple photos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201180066022.2A
Other languages
Chinese (zh)
Other versions
CN103339978A (en
Inventor
S·库利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Norton identity protection
Original Assignee
Symantec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symantec Corp filed Critical Symantec Corp
Publication of CN103339978A publication Critical patent/CN103339978A/en
Application granted granted Critical
Publication of CN103339978B publication Critical patent/CN103339978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/103Static body considered as a whole, e.g. static pedestrian or occupant recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent

Abstract

There is disclosed herein the technology of criminal's imaging for providing improvement.In a specific illustrative embodiment, these technology can be implemented as a kind of method of criminal's imaging for providing improvement, the method includes: a client terminal device is identified as at least one in losing and being stolen, a difference in detection is relevant with a visual pattern first frame on this client terminal device the first pixel data and the second pixel data that second frame with this visual pattern is correlated with, and capture multiple photos in response to this difference of detection on this client terminal device.Its objective is that increasing criminal is displayed on the probability on these photos.

Description

For providing the technology of criminal's imaging of improvement
This application claims the priority of the U.S. Serial No 12/964,972 of December in 2010 submission on the 10th, disclosure of which It is combined in this in full with it by quoting.
Disclosure field
Present disclosure generally relates to antitheft solution, and more particularly relate to provide the criminal's imaging improved Technology.
Disclose background
Mobile device (such as, laptop computer, mobile phone, panel computer (PC), net book, personal digital assistant (PDA) user and commercial use) increase the most rapidly.Equally, mobile device theft is shifted along the increasing that device uses Add and increase.Therefore, a lot of mobile devices are equipped with some burglar-proof mechanism.But, currently used a lot of burglar-proof mechanisms operation Inefficient and inoperative.
Because afore-mentioned, it is to be appreciated that there is the serious problems relevant with current anti-theft technique and defect.
Disclose summary
There is disclosed herein the technology of criminal's imaging for providing improvement.In a specific illustrative embodiment, this A kind of method that a little technology can be implemented as criminal's imaging for providing improvement, the method includes: by a client dress Put at least one being identified as in losing and being stolen, detection and first frame of a visual pattern on this client terminal device A difference in the first relevant pixel data and the second pixel data relevant to this visual pattern second frame, and This client terminal device captures multiple photos in response to this difference of detection.
According to other aspects of this specific illustrative embodiment, in being identified as this client terminal device losing and being stolen extremely Few a kind of may further include accesses the client terminal device status data stored on one server.
According to the other aspect of this specific illustrative embodiment, detect this difference may further include detection with many groups A difference in the first pixel data that pixel is relevant and the second pixel data relevant to this many groups pixel.
According to some additional aspect of this specific illustrative embodiment, detect this difference and may further include detection and be somebody's turn to do The mean differences organized in the first relevant pixel data of pixels and the second pixel data relevant to this many groups pixel more.
According to other aspects of this specific illustrative embodiment, detect this difference and may further include detection beyond one One difference of predetermined threshold.
According to the other aspect of this specific illustrative embodiment, detect this difference and may further include at one predetermined One difference of detection in time period.
According to some additional aspect of this specific illustrative embodiment, the method may further include: in this client On device, determine a confidence level of each width in this multiple photos, on this client terminal device, based in this multiple photos This multiple photos is ranked up by the confidence level of each width, and by network by the highest for having in this multiple photos The one or more of ranking are transmitted to a server.
According to other aspects of this specific illustrative embodiment, determine that confidence level may further include one face of execution Portion's detection algorithm.
According to the other aspect of this specific illustrative embodiment, the method may further include at this client terminal device Upper is that each width in this multiple photos determines a positional value, and this positional value indicates position that may be facial in a photos.
According to some additional aspect of this specific illustrative embodiment, the method may further include and fills in this client Putting and determine a size value for each width in this multiple photos, this size value indicates chi that may be facial in a photos Very little.
According to other aspects of this specific illustrative embodiment, it is ranked up farther including based on this to this multiple photos In multiple photos, the confidence level of each width, positional value and size value are ranked up.
According to the additional aspect of this specific illustrative embodiment, these technology can be implemented as at least one permanent processor Readable storage medium storing program for executing, the computer program that this storage medium is made up of instruction for storage, these instructions are configured to can Read by least one processor, to instruct this at least one processor one computer processes of execution.
In another specific illustrative embodiment, these technology can be implemented as a kind of criminal for providing improvement The goods of imaging, these goods include at least one permanent processor readable medium and are stored in the finger on this at least one medium Order, wherein these instruction be configured to can by least one processor from this at least one medium read and hence in so that this at least The operation of one processor so as a client terminal device to be identified as in losing and being stolen at least one, at this client terminal device The first pixel data that upper detection is relevant to a visual pattern first frame and second frame with this visual pattern A relevant difference in the second pixel data, and on this client terminal device, capture many in response to detecting this difference Photos.
In another specific illustrative embodiment, these technology can be implemented as a kind of criminal for providing improvement The system of imaging, this system includes the one or more processors being communicatively connected to a network, wherein this or many Individual processor is arranged at least one being identified as by a client terminal device in losing and being stolen;At this client terminal device On, detect first pixel data relevant to a visual pattern first frame and second frame with this visual pattern A relevant difference in the second pixel data, and capture several in response to this difference of detection on this client terminal device Photo.
According to the other aspect of this specific illustrative embodiment, these one or more processors can be configured to During this client terminal device is identified as losing and being stolen by the client terminal device status data that access stores on one server At least one.
According to some additional aspect of this specific illustrative embodiment, these one or more processors can be configured to lead to Cross the difference detected in the first pixel data relevant to many group pixels and the second pixel data relevant with this many groups pixel Value detects this difference.
According to other aspects of this specific illustrative embodiment, these one or more processors can be configured to inspection Survey in the first pixel data relevant to this many groups pixel and the second pixel data relevant with this many groups pixel average Difference detects this difference.
According to the other aspect of this specific illustrative embodiment, these one or more processors can be configured to Detection detects this difference beyond a difference of a predetermined threshold.
According to some additional aspect of this specific illustrative embodiment, these one or more processors can be configured to lead to Cross and in a predetermined amount of time, detect a difference to detect this difference.
According to some additional aspect of this specific illustrative embodiment, these one or more processors can be configured to On this client terminal device, determine a confidence level of each width in this multiple photos, many based on this on this client terminal device In photos, this multiple photos is ranked up by the confidence level of each width, and by a network by this multiple photos There are top ranked one or more transmit to a server.
Referring now to the exemplary embodiment of the present disclosure shown in accompanying drawing present disclosure described in more detail.Although with Lower reference exemplary embodiment describes present disclosure, but it is to be understood that present disclosure is not used in is limited to this.Utilize these technology It will be appreciated by those of ordinary skill in the art that making of additional implementation, amendment mode and embodiment and other field With all within the scope of disclosure described herein, and present disclosure can have notable effectiveness for them.
Brief Description Of Drawings
In order to help to be more fully understood from present disclosure, with reference now to accompanying drawing, the most similar element comes with similar numeral Quote.These accompanying drawings are not construed as limiting present disclosure, are only used for exemplary.
Fig. 1 illustrates the block diagram describing a kind of network architecture according to an embodiment of present disclosure, and this network architecture comprises One for providing the platform of criminal's imaging of improvement.
Fig. 2 depicts the block diagram of a kind of computer system according to an embodiment of present disclosure.
Fig. 3 illustrates multiple modules of a client according to an embodiment of present disclosure.
Fig. 4 illustrates a server anti-theft module according to an embodiment of present disclosure.
Fig. 5 illustrates pixel data according to an embodiment of present disclosure.
A kind of method that Fig. 6 illustrates criminal's imaging for providing improvement according to an embodiment of present disclosure.
Fig. 3 depicts another kind of for the method providing criminal's imaging of improvement according to an embodiment of present disclosure.
The detailed description of exemplary
In mobile device (such as, laptop computer, mobile phone, flat board PC, net book, PDA), operation is current Burglar-proof mechanism can be configured to respond to mobile device be marked as lose or stolen and from the shooting being connected to mobile device Machine capture photo.This burglar-proof mechanism capture photo, it is intended to obtaining the image of criminal, this image can be used for regaining loss Or stolen mobile device.But, there are some problems in these current burglar-proof mechanisms.First, mobile device is configured to Photo (such as, capturing a photos every 10 seconds) is captured based on intervalometer.Therefore, the probability of criminal's image is captured Relatively low.Secondly, mobile device may not use useful image (such as, the bag that any technology comprises criminal to select most probable Image containing face can be recognized) according to be transferred to server (such as, antitheft back-end server).Therefore, the net of photo is transmitted Network resource may not be utilized effectively.
In one embodiment, it is provided that for providing some technology of criminal's imaging of improvement.In this embodiment In, can be identified as mobile device losing or stolen.Based on this identification, mobile device can be configured in response to shifting being detected Move the movement in device and capture photo.In certain embodiments, detect this movement and can include that detection is connected to mobile dress Difference at least two frames of the visual pattern (such as, capture region) of the video camera put.It is to say, can be by mobile device It is configured to the first frame (such as, institute of the visual pattern on a concrete time point of the visual pattern obtained in the first moment Have the state of pixel) the second frame (such as, vision on another concrete time point of visual pattern of obtaining with the second moment The state of all pixels of image) compare, bigger to determine whether this two frame difference.In other embodiments, detect this Movement can include analyzing the data produced by any one in accelerometer, movable sensor and inclination sensor or combination.
Such as, if movement being detected in the mobile device, be connected to the video camera of mobile device can capture a width or Multiple photos.But, if being not detected by mobile in the mobile device, mobile device can wait that expression two frame differences are bigger Data.
In another embodiment, it is provided that for providing the technology of criminal's imaging of improvement.In such an embodiment, Mobile device can utilize one or more face detection algorithm to calculate in photo to comprise the confidence level of face.Mobile dress Put and be also based on corresponding confidence level one or more photo is ranked up.There are top ranked one or more shine Sheet can transmit to server (such as, antitheft back-end server) to reduce net necessary to the anti-theft technique implementing to discuss at present Network stock number.In some embodiments it is possible to calculate the position of facial positions possible in instruction photo for every photos The size value of face size possible in value and instruction photo.Therefore, it can compare based on confidence level, positional value and size value Sheet is ranked up.
Fig. 1 illustrates the block diagram describing the network architecture 100 according to an embodiment of present disclosure, and this network architecture comprises use In the platform providing the criminal's imaging improved.Fig. 1 is the simplification view of the network architecture 100, and this view can include not describing Additional elements.The network architecture 100 can comprise client 110, client 120, server 140A and server 140B(it One or more computer systems 200 that can utilize shown in Fig. 2 in are implemented).Client 110, client 120, clothes Business device 140A and server 140B can be communicatively connected to network 150.Server 140A can be communicatively connected to Storage device 160A (1)-(N), and server 140B can be communicatively connected to store device 160B (1)-(N).Server 140A can comprise server anti-theft module 142.Server 140A and server 140B can be communicatively connected to SAN(and deposit Storage Local Area Network) structure 170.SAN fabric 170 can pass through network 150 back-level server 140A and server 140B and visitor Family end 110 and the client 120 access to storage device 180 (1)-(N).Server 140A can be communicatively connected to network 190.Client 120 could be included for providing one or more modules of the criminal's imaging improved, and these modules include visitor Family end anti-theft module 122, photo capture module 124 and upper transmission module 126.
With reference to the computer system 200 of Fig. 2, modem 247, network interface 248 or some additive methods can be used for One or more connections to network 150 from client 110 and client 120 are provided.Client 120 can utilize such as Web browser or other client softwares access the information on server 140A or server 140B.This client can permit Permitted client 120 access server 140A or server 140B or storage device 160A (1)-(N), 160B (1)-(N) and/or The data that one of 180 (1)-(N) is hosted.
Network 150 and 190 can be Local Area Network, wide area network (WAN), the Internet, cellular network, satellite network or Allow at client 110, client 120, server 140A, server 140B and be communicatively connected to network 150 and 190 Other networks communicated between other devices.Network 150 and 190 may further include above-mentioned exemplary types One of network or any amount, these networks run as separate network or run with other network cooperatings each.Network 150 With the 190 one or more agreements that can utilize one or more client or server, network 150 and 190 communicatively connects It is connected to these clients or server.Network 150 and 190 may switch to or from one of other protocol conversions to network equipment Or multiple agreement.Although network 150 and 190 being each depicted as a network, it should be appreciated that according to one or more realities Executing example, network 150 and 190 can each include the network of multiple interconnection.
Storage device 160A (1)-(N), 160B (1)-(N) and/or 180 (1)-(N) can be network accessible storage And can be local, long-range or they relative to client 110, client 120, server 140A or server 140B Combination.Storage device 160A (1)-(N), 160B (1)-(N) and/or 180 (1)-(N) can utilize RAID (" RAID "), tape, disk, storage area network (" SAN "), Internet Small Computer Systems Interface (" iSCSI ") SAN, Fiber channel SAN, CIFS (" CIFS "), network attached storage (" NAS "), NFS (" NFS "), memorizer based on light or other computer-accessible memory.Storage device 160A (1)-(N), 160B (1)- And/or 180 (1)-(N) can be used for backing up, replicating or file purpose (N).
Can be smart phone, PDA, desktop computer, above-knee according to some embodiments, client 110 and client 120 Computer, server, another kind of computer or by wirelessly or non-wirelessly connecting another device being connected with network 150.Visitor Family end 110 and client 120 can input from user, data base, file, network service and/or application programming interface connect Receive data.
Server 140A and server 140B can be apps server, archives platform, backup server, rear end clothes Business device, network storage device, media server, e-mail server, document management platform, enterprise search server or logical Letter property it is connected to other devices of network 150.Server 140A and server 140B can utilize storage device 160A (1)- (N), one of 160B (1)-(N) and/or 180 (1)-(N) store application data, replicate data, Backup Data or other Data.Server 140A and server 140B can be main frame, such as application server, and these main frames can process in client 110 and client 120 and backup platform, between backup process and/or memorizer transmission data.According to some embodiments, clothes Business device 140A and server 140B could be for backup and/or the platform of filing data.
Client anti-theft module 122, photo capture module 124, upper transmission module 126 and service are discussed more detail below Device anti-theft module 142.
Fig. 2 depicts the block diagram of computer system 200 according to an embodiment of present disclosure.Computer system 200 is suitable for In implementing the technology consistent with present disclosure.Computer system 200 can include bus 212, and this bus can be by department of computer science The major subsystems of system 200 is connected with each other, and such as central processing unit 214, Installed System Memory 217(are such as, RAM(random access memory Device), ROM(read only memory), flash RAM or similar memorizer), input/output (I/O) controller 218, external audio device (such as via the speaker system 220 of audio output interface 222), external device (ED) are (such as via the display of display adapter 226 Screen 224), serial port 228 with 230, keyboard 232(is connected by KBC 233), memory interface 234, operable use In receiving the floppy disk 237 of floppy disk 238, can be used to the host bus adapter that is connected with fiber channel network 290 Device (HBA) interface card 235A, can be used to be connected to SCSI bus 239 host bus adaptor (HBA) interface card 235B, And can be used to receive the CD drive 240 of CD 242.Mouse 246(or other pointing devices, warp can also be included Be connected to bus 212 by serial port 228), modem 247(be connected to bus 212 via serial port 230) and Network interface 248(is connected directly to bus 212), power supervisor 250 and battery 252.
Bus 212 allows the data communication between central processing unit 214 and Installed System Memory 217, as previously mentioned, in system Deposit and can include read only memory (ROM) or flash memory (the most not shown) and random-access memory (ram) (not shown).RAM Can be that main storage, operating system and application program can be loaded into wherein.Except other codes, ROM or flash memory can wrap Containing the basic input output system (BIOS) controlling basic hardware operation (such as with peripheral assembly mutual).With computer system 200 application programs resided on together can be stored on a computer-readable medium and be conducted interviews by it, computer-readable Medium e.g. hard disk drive (such as, fixed disk 244), CD (such as, CD-ROM driver 240), floppy disk unit 237 or its His storage medium.Such as, anti-theft module 122, photo capture module 124 and upper transmission module 126 can reside on Installed System Memory 217 In.
It is readable that memory interface 234 can be connected to standard computer as other memory interfaces of computer system 200 Medium (such as consolidate disk drive 244) is for the storage of information and/or retrieval.Gu disk drive 244 can be department of computer science A part for system 200 can be maybe independent and can be accessed by other interface systems.Modem 247 can lead to Cross telephone link and being directly connected to or being provided to the Internet by Internet service provider (ISP) of remote server is provided Be directly connected to.Network interface 248 can pass through straight-forward network link (this network link passes through POP(point of presence) and be connected to mutually Networking) it is connected directly to remote server.Network interface 248 can utilize wireless technology to provide this connection, including numeral honeybee Cellular telephone connection, Cellular Digital Packet Data (CDPD) connection, digital satellite data connection etc..
A lot of other devices (such as, document scanner, digital camera etc.) or subsystem (not shown) can use similar Mode be attached.On the contrary, for implementing present disclosure, be not required to all devices shown in Fig. 2.These devices and subsystem System can be connected with each other in the way of employing is different from shown in Fig. 2.The code of enforcement present disclosure can be stored in computer-readable and deposit In storage media, such as one or more in Installed System Memory 217, solid dish 244, CD 242 or floppy disk 238.Implement present disclosure Code can also be received and stored in memorizer by one or more interfaces.The operation system provided in computer system 200 System can be Or operating system known to another kind of.
Power supervisor 250 can monitor the power level of battery 252.Power supervisor 250 can provide one or many Individual API(application programming interfaces) to allow time window, the power determining power level, retaining before the system of shutting down computer 200 Whether consumption rate, computer system use civil power (such as, AC power) or the designator of the power of battery and other power Relevant information.According to some embodiments, the API(of power supervisor 250 can be remotely accessed for example, it is possible to connected by network Receiving asks that remote backup manages module).According to some embodiments, battery 252 can be or be positioned at computer system 200 this locality Or uninterrupted power supply (ups) Unity away from it.In such an embodiment, power supervisor 250 can provide the power with UPS The information that grade is relevant.
Fig. 3 illustrates multiple modules of client 120 according to an embodiment of present disclosure.As it can be seen, client 120 Can comprise one or more assembly, these assemblies include client anti-theft module 122, photo capture module 124 and upload mould Block 126.
Following description describe the network element of system and method for a kind of criminal's imaging for providing improvement, calculating Machine and/or assembly, this system and method includes one or more module.As used herein, term " module " can be interpreted as Refer to software for calculation, firmware, hardware and/or their various combination.But, these modules be not construed as not hardware, That implement on firmware or record on the readable recordable storage medium of processor software (that is, module is not software itself).Should When it is noted that these modules are exemplary.These modules can be combination, integrated, independent and/or duplication, To support various application program.It addition, the function performed in concrete module described herein can substitute this concrete module Or except performing to perform and/or by one or more in other modules external one or more of this function in this concrete module Other devices perform.Further, these modules can among multiple devices and/or closer to each other or away from other groups Implement on part.It addition, these modules from a device removal and add to another device, and/or can may be embodied in In the two device.
Client anti-theft module 122 can be configured to be identified as client terminal device (such as, client 120) to lose or Stolen.In one embodiment, client can be filled by client anti-theft module 122 by access client unit state data Put (such as, client 120) to be identified as losing or stolen.Client terminal device status data may indicate that one or more client The possession state of device (such as, lose, stolen).In certain embodiments, client anti-theft module 122 can access communicativeness The client terminal device status data on server (such as, antitheft back-end server) connected.
Client anti-theft module 122 can be arranged to determine client terminal device (such as, client 120) the most Lose or stolen.In one embodiment, client anti-theft module 122 can be based on client terminal device (such as, client 120) That produce or by geodata (such as, geographical sensing data, global positioning system (GPS) number representated by this client terminal device According to) determine that this client terminal device has been lost or stolen.Such as, client anti-theft module 122 can be based on instruction visitor Family end device (such as, client 120) has been moved off ad-hoc location (such as, 10 feet of distances, bedrooms outside specific office block Outside 5 feet of distances) geodata determine that this client terminal device has been lost or stolen.In another embodiment In, that client anti-theft module 122 can produce based on client terminal device (such as, client 120) or by this client terminal device Representative mobile data determine that this client terminal device has been lost or stolen.Such as, client anti-theft module 122 can With based on represent client terminal device (such as, client 120) moved a certain distance (such as, distance initial position 2 inches, Distance initial position 1 inch) mobile data determine that this client terminal device has been lost or stolen.Implement at another In example, that client anti-theft module 122 can produce based on this client terminal device (such as, client 120) or by this client The stress data (force data) that device represents determines that this client terminal device has been lost or stolen.Such as, client It is the most removed that end anti-theft module 122 can be connected to the security cable of this client terminal device (such as, client 120) based on expression The stress data of (such as, mandatory remove) is to determine that this client terminal device has been lost or stolen.
Photo capture module 124 can be arranged to be identified as in response to by client terminal device (such as, client 120) Lose or the stolen movement detecting this client terminal device.In one embodiment, photo capture module 124 can be by detection Be connected to the video camera of client terminal device (such as, client 120) video image (such as, capture region) at least two frames it Between difference detect the movement of this client terminal device.In such an embodiment, when picture trapping module 124 can compare first Second frame of the visual pattern that the first frame of the visual pattern that quarter obtains and the second moment obtain, to determine whether this two frame difference Bigger.It is to say, image capture module 124 can compare the pixel data of two different time points to determine this pixel data Change with whether having timed, out (movement client terminal device such as, being detected).
In certain embodiments, if the mean difference in the pixel data of pixel group is (such as, predetermined beyond predetermined threshold The difference of amount), photo capture module 124 may determine that and exists for larger difference between two frames.For example, it is possible to based on design partially Well threshold value is defined as 25%.Therefore, if the average of at least 25% pixel that pixel data is between two frames changes, photo Trapping module 124 may determine that and there is larger difference between two frames and detect movement.
In certain embodiments, if there is the difference of the pixel data of scheduled volume in scheduled time slot between multiframe, shine Sheet trapping module 124 is assured that and there is enough difference.Such as, based on design preference, discrepancy threshold amount may determine that into 25%, the time period may determine that to be 1 second.Therefore, if the pixel data at least 25% pixel between multiframe is equal at least 1 second Value changes, and photo capture module 124 may determine that and there is larger difference between multiframe and detect movement.
In another embodiment, photo capture module 124 by accessing and can be analyzed by accelerometer, movable sensor The data produced with any one in inclination sensor or combination detect in client terminal device (such as, client 120) Mobile.If passed it is to say, be connected to the accelerometer of client terminal device (such as, client 120), movable sensor and inclination The data that sensor produces are beyond one or more predetermined thresholds, and photo capture module 124 is assured that and detects that client fills The movement put.
In response to the movement of client terminal device (such as, client 120) being detected, photo capture module 124 can be configured Utilize and be connected to the video camera of this client's section apparatus to capture one or more photo.In one embodiment, photo capture mould Block 124 can be in response to detecting that the movement of client terminal device is to capture a series of photo.In another embodiment, in response to The movement of client terminal device being detected, photo capture module 124 (such as, can be shone every 5 seconds capture 5 width based on predetermined space Sheet, obtain 1 photos every several number of seconds) capture one or more photo.
Photo capture module 124 can be configured to the image of every width capture and calculate confidence level, positional value and chi Very little value.In one embodiment, photo capture module 124 can be the confidence etc. that every photos calculates that face is included in photo Level, this photo obtains by performing one or more face detection algorithms.The face detection performed by photo capture module 124 Algorithm can include such as pattern classification task algorithm (such as, implementing dual mode classification task), controlled background face detection Algorithm (such as, smooth or static background removal with display and being detected face), colored face detection algorithms (such as, profit Find face area with skin color), action face detection algorithms (such as, detection unique certain types of to face Action, such as: the nostril blink, frown, opened, forehead wrinkly, the mouth that opens) and face detection based on model In algorithm (such as, on image travel through facial model detect face) these face detection any one or combine.
In other embodiments, photo capture module 124 can be every photos calculate instruction comprise in photo can The positional value of the position (such as, represent with distance) of energy face, this photo is by performing above-mentioned one or more face detection Algorithm and obtain.Such as, relevant with the photo of capture for the first time primary importance value can represent possible in acquisition procedure Face's about 100 feet of video camera of distance.In another example, the second position value relevant with the photo of second time capture can To represent possible in acquisition procedure face about 2 feet of video camera of distance.
In another embodiment, photo capture module 124 can calculate size value, this size value for each photos The size (such as, with height and width, represent with girth) of the possible face that instruction comprises in photo, this photo is by holding Row above-mentioned one or more face detection algorithm and obtain.Such as, relevant to the photo of capture for the first time first size value The face that can represent possible in acquisition procedure has the height of 2 centimetres and the width of 1 centimetre.Such as, with second time capture Relevant the second size value of photo can represent that face possible in acquisition procedure has the height of 8 inches and 5 inches Width.
Photo capture module 124 can be configured to based on corresponding confidence level, corresponding positional value and corresponding chi Every photos of capture is ranked up by any one or the combination in very little value.Therefore, there is the highest confidence level, the shortest position The photo of value and full-size value can be ordered as the highest.And there is minimum confidence level, the shortest positional value and minimum dimension value Photo can be ordered as minimum.Photo capture module 124 can select have top ranked one or more also in photo It is sent to server (such as, antitheft back-end server) to help to retrieve loss or stolen client terminal device.
Upper transmission module 126 can be arranged to the photo selected by server (such as, antitheft back-end server) transmission. In one embodiment, upper transmission module 126 can be arranged to detect when client terminal device (such as, client 120) connects It is connected to network (such as, the Internet).In response to detecting that network connects, upper transmission module 126 can be (such as, antitheft to server Back-end server) transmit selected by photo.
Fig. 4 illustrates server anti-theft module 142 according to an embodiment of present disclosure.As it can be seen, server is antitheft Module 142 can comprise one or more assembly, and these assemblies include loss/stolen identification module 400 and Photo Receiver module 402。
Following description describe the network element of system and method for criminal's imaging for providing improvement, computer And/or assembly, this system and method includes one or more module.As used herein, term " module " can be interpreted as table Show software for calculation, firmware, hardware and/or their various combinations.But, these modules are not construed as not at hardware, consolidate That implement on part or record on the readable recordable storage medium of processor software (that is, module is not software itself).Should It is noted that these modules are exemplary.These modules can be combination, integrated, independent and/or duplication, with Just various application program is supported.It addition, described herein in concrete module perform function can substitute this concrete module or Except performing and/or by other devices one or more in other modules external one or more of execution in this concrete module Perform.Further, these modules can among multiple devices and/or closer to each other or away from other assemblies on real Execute.It addition, these modules from a device removal and add to another device, and/or can may be embodied in the two In device.
(such as, loss/stolen identification module 400 can be configured to the client terminal device of storage and multiple communication connections Client 110,120) relevant client terminal device status data.Client terminal device status data may indicate that one or more visitor The possession state of family end device (such as, lose, stolen).Therefore, when client terminal device is reported as losing or being stolen, lose Mistake/stolen identification module 400 can update applicable client terminal device status data.
Photo Receiver module 402 can be arranged to from being identified as loss or stolen one or more communication link The client terminal device (such as, client 110,120) connect receives one or more photo.In certain embodiments, Photo Receiver Module 402 can store the photo received for regaining loss or stolen client terminal device.
Fig. 5 illustrates pixel data according to an embodiment of present disclosure.As it can be seen, be connected to client terminal device (example Such as, client 120) the visual pattern 500 of video camera can comprise and organize pixel more.Such as, virtual image 500 can comprise picture Element group 502,504,506,508,510,512,514,516,518.Each pixel groups can comprise 9 pixels.
Pixel datas based on two successive frames, it is believed that black picture element changes, and it is believed that white picture Element does not changes.As it can be seen, pixel groups 502 can have the pixel difference of 33%, pixel groups 504 can have 67% pixel poor Different, pixel groups 506 can have the pixel difference of 44%, pixel groups 508 that the pixel difference of 78%, pixel groups 510 can be had to have The pixel difference of 44%, pixel groups 512 can have the pixel difference of 56%, pixel groups 514 can have the pixel difference of 56%, pixel Group 516 can have the pixel difference of 44%, and pixel groups 518 can have the pixel difference of 56%.Based on these pixel difference, pixel Mean pixel difference between two successive frames of group 502,504,506,508,510,512,514,516,518 is 53%.Such as, If predetermined difference amount is 25%, the pixel data difference between two successive frames represented in Fig. 5 is at client terminal device to be detected Movement on have larger difference.
Fig. 6 depicts according to an embodiment of present disclosure and provides the method 600 of the criminal's imaging improved.In module 602, method 600 can start.
In module 604, client terminal device can be identified as at least one in losing or being stolen.An embodiment In, by the client terminal device status number of the upper storage of server (such as, antitheft back-end server) that capture connects at communicativeness According to, can be identified as client terminal device losing or stolen.
In module 606, first pixel data relevant to the first frame of visual pattern and the second frame phase with visual pattern Difference in the second pixel data closed detects on client terminal device.Can capture for the first time the first frame, and second time The second frame can be captured.Detect that this species diversity may indicate that the movement of client terminal device.
In module 608, in response to this difference being detected, multiple photos can be captured on client terminal device.A reality Execute in example, in response to this difference being detected, a series of multiple photos can be captured on client terminal device.In another embodiment In, in response to this difference being detected, can be based on predetermined interval (such as, every 5 seconds 5 photos, every several seconds 1 width Photo) capture one or more photo.
In module 610, method 600 can terminate.
Fig. 7 depicts another kind of for the method providing criminal's imaging of improvement according to an embodiment of present disclosure 700.In module 702, method 700 can start.
In module 704, in response at least one being identified as by client terminal device in losing and being stolen, this visitor can be captured Multiple photos on the end device of family.In one embodiment, in response to difference being detected, can capture on this client terminal device A series of multiple photos.In another embodiment, in response to difference being detected, can based on predetermined interval (such as, every 5 seconds 5 photos, every several seconds 1 photos) capture one or more photo.
In module 706, for each width in the multiple photos on client terminal device, determine putting of the photo comprising face Letter grade.In one embodiment, by performing one or more face detection algorithm, each width of this multiple photos is determined Confidence level.
In module 708, the confidence level of each width based on the multiple photos on this client terminal device, to this multiple photos It is ranked up.In one embodiment, the photo with the highest confidence level is ordered as the highest, and will have minimum confidence etc. The photo of level is ordered as minimum.
In module 710, the one or more having in this top ranked multiple photos are transmitted to server.At one In embodiment, this one or more photo with the highest confidence level ranking is transmitted to back-end server (such as, after antitheft End server).
In module 712, method 700 can terminate.
Now it should be noted that, the criminal that the offer of present disclosure improves in accordance with the above is imaged in a way It is usually directed to process input data and produce output data.This input data process and output data produce can at hardware or Implement on software.Such as, specific electronic building brick can be used in server anti-theft module or similar or relevant circuit, with Present disclosure the most as described above implements the function relevant to providing the criminal's imaging improved.Alternately, according to finger One or more processors of order operation present disclosure as described above can be implemented and provide the criminal's imaging improved Relevant function.If situation is really such, in the range of present disclosure, these instructions can be stored in one or more process On device readable storage medium storing program for executing (such as, disk or other storage mediums), or by one or more carrier waves embody one Or the transmission of multiple signal is to one or more processors.
Present disclosure should not be limited in scope determined by specific embodiments described herein.Really, except retouching herein Those embodiments stated, for those of ordinary skill in the art, other various enforcements that present disclosure is made an amendment Example is obvious from the point of view of described above and accompanying drawing.Therefore, these other embodiments and modification are intended to fall within present disclosure Within the scope of.And, although describing in the case of the specific implementation of specific environment for specific purpose herein Present disclosure, but the effectiveness that those of ordinary skill in the art it will be appreciated that it is not restricted to this, and can be for Arbitrarily purpose implements present disclosure in any environment beneficially.Therefore, claims presented below should be according to described herein Whole ranges of present disclosure and spirit explain.

Claims (19)

1. for the method providing criminal's imaging of improvement, including:
One client terminal device is identified as at least one in losing and being stolen;
On this client terminal device, detect first pixel data relevant to a visual pattern first frame and regard with this A difference in the second pixel data that one the second frame of feel image is correlated with;
On this client terminal device, capture multiple photos in response to detecting this difference;
On this client terminal device, determine a confidence level of each width in this multiple photos;With
On this client terminal device, this multiple photos is ranked up by confidence level based on width each in this multiple photos.
2. the method for claim 1, at least one being wherein identified as by this client terminal device in losing and being stolen is entered One step includes accessing the client terminal device status data stored on one server.
3. the method for claim 1, wherein detects this difference and farther includes to detect first relevant to many group pixels A difference in pixel data and the second pixel data relevant to this many groups pixel.
4. method as claimed in claim 3, wherein detects this difference and farther includes to detect relevant to this many groups pixel the A mean difference in one pixel data and the second pixel data relevant to this many groups pixel.
5. the method for claim 1, wherein detects this difference and farther includes detection beyond the one of a predetermined threshold Individual difference.
6. the method for claim 1, wherein detects this difference and further includes at detection one in a predetermined amount of time Individual difference.
7. the method for claim 1, farther includes:
By a network, the top ranked one or more that have in this multiple photos are transmitted to a server.
8. method as claimed in claim 7, wherein determines that this confidence level farther includes to perform a face detection algorithms.
9. method as claimed in claim 7, further includes on this client terminal device as each width in this multiple photos Determining a positional value, this positional value indicates position that may be facial in a photos.
10. method as claimed in claim 9, further includes on this client terminal device as each width in this multiple photos Determining a size value, this size value indicates size that may be facial in a photos.
11. methods as claimed in claim 10, are wherein ranked up this multiple photos farther including to shine based on these several In sheet, the confidence level of each width, positional value and size value are ranked up.
12. 1 kinds of systems being used for providing criminal's imaging of improvement, this system includes:
For a client terminal device being identified as the device of at least one in losing and being stolen;
First pixel data relevant to a visual pattern first frame for detection on this client terminal device and with The device of a difference in the second pixel data that one the second frame of this visual pattern is relevant;
For capturing the device of multiple photos on this client terminal device in response to this difference of detection;
For determining the device of a confidence level of each width in this multiple photos on this client terminal device;With
For confidence level based on width each in this multiple photos on this client terminal device, this multiple photos is ranked up Device.
13. 1 kinds of systems being used for providing criminal's imaging of improvement, including:
It is communicatively connected to one or more processors of a network;Wherein these one or more processors are configured to:
One client terminal device is identified as at least one in losing and being stolen;
On this client terminal device, detect first pixel data relevant to a visual pattern first frame and regard with this A difference in the second pixel data that one the second frame of feel image is correlated with;
On this client terminal device, capture multiple photos in response to detecting this difference;
On this client terminal device, determine a confidence level of each width in this multiple photos;With
On this client terminal device, this multiple photos is ranked up by confidence level based on width each in this multiple photos.
14. systems as claimed in claim 13, wherein these one or more processors are configured to access at clothes On business device, this client terminal device is identified as at least one in losing and being stolen by the client terminal device status data of storage.
15. systems as claimed in claim 13, wherein these one or more processors are configured to detection and organize picture more A difference in plain the first relevant pixel data and the second pixel data relevant to this many groups pixel detects this difference.
16. systems as claimed in claim 15, wherein these one or more processors are configured to detect and these many groups A mean difference in the first pixel data that pixel is relevant and the second pixel data relevant to this many groups pixel detects This difference.
17. systems as claimed in claim 13, wherein these one or more processors are configured to detection beyond one One difference of predetermined threshold detects this difference.
18. systems as claimed in claim 13, wherein these one or more processors are configured to a pre-timing Between in section one difference of detection detect this difference.
19. systems as claimed in claim 13, wherein these one or more processors are configured to:
By a network, the top ranked one or more that have in this multiple photos are transmitted to a server.
CN201180066022.2A 2010-12-10 2011-12-08 For providing the technology of criminal's imaging of improvement Active CN103339978B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US12/964,972 US8730334B2 (en) 2010-12-10 2010-12-10 Techniques for providing improved perpetrator imaging
US12/964972 2010-12-10
US12/964,972 2010-12-10
PCT/US2011/064007 WO2012078914A1 (en) 2010-12-10 2011-12-08 Method and device for providing improved perpetrator imaging

Publications (2)

Publication Number Publication Date
CN103339978A CN103339978A (en) 2013-10-02
CN103339978B true CN103339978B (en) 2016-08-10

Family

ID=45464849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201180066022.2A Active CN103339978B (en) 2010-12-10 2011-12-08 For providing the technology of criminal's imaging of improvement

Country Status (6)

Country Link
US (1) US8730334B2 (en)
EP (1) EP2649834B1 (en)
JP (1) JP5934244B2 (en)
CN (1) CN103339978B (en)
CA (1) CA2821090C (en)
WO (1) WO2012078914A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220637A (en) * 2012-01-19 2013-07-24 腾讯科技(深圳)有限公司 Mobile phone anti-theft protection method and mobile phone anti-theft protection device
US9558338B2 (en) * 2012-11-07 2017-01-31 Htc Corporation Method and apparatus for performing security control by using captured image
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
US10157190B2 (en) * 2016-03-28 2018-12-18 Microsoft Technology Licensing, Llc Image action based on automatic feature extraction

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101449280A (en) * 2006-06-08 2009-06-03 国际商业机器公司 A validation engine

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10301655A (en) * 1997-04-25 1998-11-13 Nec Niigata Ltd Built-in security function personal computer and its recording medium
US20020097145A1 (en) 1997-11-06 2002-07-25 David M. Tumey Integrated vehicle security system utilizing facial image verification
AUPP400998A0 (en) * 1998-06-10 1998-07-02 Canon Kabushiki Kaisha Face detection in digital images
JP3727798B2 (en) * 1999-02-09 2005-12-14 株式会社東芝 Image surveillance system
JP2000330663A (en) * 1999-05-18 2000-11-30 Nec Corp Burglar monitoring device
JP5032846B2 (en) * 2004-08-31 2012-09-26 パナソニック株式会社 MONITORING DEVICE, MONITORING RECORDING DEVICE, AND METHOD THEREOF
JP2007195063A (en) * 2006-01-20 2007-08-02 Sharp Corp Portable terminal device
JP2008005025A (en) * 2006-06-20 2008-01-10 Nec Saitama Ltd Mobile wireless terminal
US9729696B2 (en) 2006-09-20 2017-08-08 Samsung Electronics Co., Ltd Method and system for tracking mobile communication device using MMS
US9083624B2 (en) 2007-03-02 2015-07-14 Activetrak, Inc. Mobile device or computer theft recovery system and method
JP4775306B2 (en) * 2007-04-23 2011-09-21 ソニー株式会社 Image processing apparatus, imaging apparatus, image display control method, and computer program
US9576157B2 (en) * 2008-04-02 2017-02-21 Yougetitback Limited Method for mitigating the unauthorized use of a device
US9031536B2 (en) 2008-04-02 2015-05-12 Yougetitback Limited Method for mitigating the unauthorized use of a device
US8483659B2 (en) * 2009-02-26 2013-07-09 Qualcomm Incorporated Methods and systems for recovering lost or stolen mobile devices

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101449280A (en) * 2006-06-08 2009-06-03 国际商业机器公司 A validation engine

Also Published As

Publication number Publication date
JP2014506041A (en) 2014-03-06
WO2012078914A1 (en) 2012-06-14
US20120147203A1 (en) 2012-06-14
EP2649834B1 (en) 2016-03-02
CA2821090A1 (en) 2012-06-14
US8730334B2 (en) 2014-05-20
EP2649834A1 (en) 2013-10-16
CN103339978A (en) 2013-10-02
CA2821090C (en) 2016-09-13
JP5934244B2 (en) 2016-06-15

Similar Documents

Publication Publication Date Title
CN108475326B (en) Method for providing service associated with image, storage medium, and electronic device
AU2016212943B2 (en) Image processing method and electronic device for supporting the same
US10504001B2 (en) Duplicate/near duplicate detection and image registration
US20190197365A1 (en) Device and method for processing metadata
CN103119595B (en) Shared by the automatic media hitting by shutter
CN106105185B (en) Indicate method, mobile device and the computer readable storage medium of the profile of user
US20140293069A1 (en) Real-time image classification and automated image content curation
CN106165386A (en) For photo upload and the automatic technology of selection
KR20170019823A (en) Method for processing image and electronic device supporting the same
CN109417584B (en) Suggesting image files for deletion based on image file parameters
KR20170136920A (en) Method for Outputting Screen and the Electronic Device supporting the same
CN103339978B (en) For providing the technology of criminal's imaging of improvement
US20140071160A1 (en) Electronic apparatus and display control method
CN107646109A (en) Manage the characteristic of the environment mapping on electronic equipment
CN106254807B (en) Electronic device and method for extracting still image
CN113409056B (en) Payment method and device, local identification equipment, face payment system and equipment
US10091436B2 (en) Electronic device for processing image and method for controlling the same
CN112084157A (en) File recovery method and device, computer equipment and storage medium
WO2023121708A1 (en) Image group classifier in a user device
US20160110427A1 (en) Apparatus, system, and method for organizing and embedding applications
CN113703956A (en) Training task execution method, device, equipment and storage medium
KR20150106621A (en) Terminal and service providing device, control method thereof, computer readable medium having computer program recorded therefor and image searching system
US20190188507A1 (en) Altering Biometric Data Found in Visual Media Data
CN111738282A (en) Image recognition method based on artificial intelligence and related equipment
WO2023121707A1 (en) Ranking images in an image group

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: California, USA

Patentee after: Norton identity protection

Address before: California, USA

Patentee before: Symantec Corp.

CP01 Change in the name or title of a patent holder